{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T08:05:53Z","timestamp":1759133153185,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,5]]},"DOI":"10.1109\/iccomm.2014.6866697","type":"proceedings-article","created":{"date-parts":[[2014,7,30]],"date-time":"2014-07-30T17:12:11Z","timestamp":1406740331000},"page":"1-4","source":"Crossref","is-referenced-by-count":5,"title":["Securing communication in cyber-physical systems using steganography and cryptography"],"prefix":"10.1109","author":[{"given":"Laura","family":"Vegh","sequence":"first","affiliation":[]},{"given":"Liviu","family":"Miclea","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"ElGamal Encryption","year":"0","key":"15"},{"key":"13","article-title":"Cyber-physical systems security - challenges and research","author":"pal","year":"0","journal-title":"BBN Technologies"},{"journal-title":"Challanges in Security for Cyber-Physical Systems","year":"0","author":"neuman","key":"14"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.5120\/1238-1714"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLC.2010.41"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.9734\/BJAST\/2013\/3682"},{"key":"2","article-title":"Secure multi-agent system using the ElGamal decryption algorithm with (K+1) degrees of access","author":"vegh","year":"2013","journal-title":"The 6th International Conference on Security for Information Technology and Communications"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCEEE.2013.6633920"},{"journal-title":"Metode Criptografice Pentru Sisteme Structurate","year":"2011","author":"flonta","key":"10"},{"key":"7","article-title":"Biometrics security using steganography","volume":"2","author":"kant","year":"0","journal-title":"International Journal of Security"},{"key":"6","article-title":"Enhancing data security using video steganography","author":"wajgade","year":"2013","journal-title":"International Journal of Emerging Technology and Advanced Engineering"},{"key":"5","article-title":"Enhancing the data security features of communication by means of media files through improvising the cryptographic and steganographic techniques","author":"shakar","year":"2013","journal-title":"ASM's International E-Journal of Ongoing Research in Management and IT"},{"key":"4","article-title":"An improved LSB based Steganography with Enhanced Security and Embedding\/Extraction","author":"juneja","year":"2013","journal-title":"3rd International Conference on Intelligent Computational Systems"},{"journal-title":"Image Steganography Applications for Secure Communication","year":"2012","author":"morkel","key":"9"},{"key":"8","first-page":"126","article-title":"Hiding the text iinformation using steganography","volume":"2","author":"grace venice","year":"2012","journal-title":"International Journal of Engineering Research and Application"}],"event":{"name":"2014 10th International Conference on Communications (COMM)","start":{"date-parts":[[2014,5,29]]},"location":"Bucharest, Romania","end":{"date-parts":[[2014,5,31]]}},"container-title":["2014 10th International Conference on Communications (COMM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6856368\/6866648\/06866697.pdf?arnumber=6866697","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T16:25:44Z","timestamp":1490286344000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6866697\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/iccomm.2014.6866697","relation":{},"subject":[],"published":{"date-parts":[[2014,5]]}}}